WeekDayDescriptionReadingsNotes
1January 14IntroDetailed Reconstruction
of an Internet-Scale Event
2January 21Measurement techniques,
methodology, and ethics
Debian SSL Vulnerability
ZMap: Fast Internet-Wide Scanning
Botnet-based Internet Census 2012*
research prompt
3January 28Browser fingerprintingPanopticlick
History sniffing
Tracking survey
FPDetective
4February 4Botnet infiltration and
community ethical standards
Botlab
Spamalytics
Your Botnet is My Botnet
ethical behavior in security research
The Menlo Report
5February 11DeanonymizationPredicting Social Security Numbers
from Public Data

Robust De-anonymization
of Large Sparse Datasets

k-Anonymity: A Model for Protecting Privacy
midterm,
due before class Feb 25
6February 18Online advertisingPrivad
Microtargeting privacy violations
Who Do Online Advertisers Think You Are?
7February 25Special session: online advertisingNo readings
8March 4CensorshipFreenet
Tor
Cirripede
9March 11Online Social NetworksPersona
User Interactions in Social Networks
Socialbots
10March 18Signal Reconstruction(sp)iPhone
TEMPEST
Phonotactic Reconstruction
March 25Spring Break - no classNo readings
11April 1k-Anonymity+l-Diversity
please review the original k-Anonymity paper from week 5.
12April 3More privacy preserving data analysis techniquesm-Invariance
Differential Privacy
13April 15BitcoinBitcoin
Bitter to Better
Payment Characterization
14April 17NSA scandalReadings posted on Piazza
15April 30

* This is not a research paper; this paper is presented primarily to discuss the ethics of the perpetrator as well as alternative methods for conducting similar research ethically.